app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter must be base64 encoded (note that base64 encoding, instead of URL encoding, is very rare in a directory traversal attack vector).
Max CVSS
7.5
EPSS Score
0.20%
Published
2018-11-29
Updated
2018-12-21
The agent in OSSEC through 3.1.0 on Windows allows local users to gain NT AUTHORITY\SYSTEM access via Directory Traversal by leveraging full access to the associated OSSEC server.
Max CVSS
7.8
EPSS Score
0.04%
Published
2018-11-29
Updated
2019-01-04
GreenCMS v2.3.0603 allows remote authenticated administrators to delete arbitrary files by modifying a base64-encoded pathname in an m=admin&c=media&a=delfilehandle&id= call, related to the m=admin&c=media&a=restorefile delete button.
Max CVSS
5.5
EPSS Score
0.10%
Published
2018-11-17
Updated
2020-08-24
LAOBANCMS 2.0 allows install/mysql_hy.php?riqi=../ Directory Traversal.
Max CVSS
9.8
EPSS Score
0.71%
Published
2018-11-17
Updated
2020-05-07
Zyxel VMG1312-B10D devices before 5.13(AAXA.8)C0 allow ../ Directory Traversal, as demonstrated by reading /etc/passwd.
Max CVSS
7.5
EPSS Score
0.58%
Published
2018-11-17
Updated
2018-12-17
An issue was discovered in LAOBANCMS 2.0. It allows arbitrary file deletion via ../ directory traversal in the admin/pic.php del parameter, as demonstrated by deleting install/install.txt to permit a reinstallation.
Max CVSS
7.5
EPSS Score
0.08%
Published
2018-11-12
Updated
2018-12-11
An issue was discovered in XiaoCms 20141229. admin\controller\database.php allows arbitrary directory deletion via admin/index.php?c=database&a=import&paths[]=../ directory traversal.
Max CVSS
5.5
EPSS Score
0.05%
Published
2018-11-12
Updated
2019-01-23
statics/ueditor/php/vendor/Local.class.php in YUNUCMS 1.1.5 allows arbitrary file deletion via the statics/ueditor/php/controller.php?action=remove key parameter, as demonstrated by using directory traversal to delete the install.lock file.
Max CVSS
7.5
EPSS Score
0.08%
Published
2018-11-11
Updated
2018-12-12
PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 on Windows allows remote attackers to write to arbitrary image files.
Max CVSS
7.5
EPSS Score
0.49%
Published
2018-11-09
Updated
2020-08-24
An issue was discovered in mod_alias_physical_handler in mod_alias.c in lighttpd before 1.4.50. There is potential ../ path traversal of a single directory above an alias target, with a specific mod_alias configuration where the matched alias lacks a trailing '/' character, but the alias target filesystem path does have a trailing '/' character.
Max CVSS
7.5
EPSS Score
0.49%
Published
2018-11-07
Updated
2022-03-31
KindEditor through 4.1.11 has a path traversal vulnerability in php/upload_json.php. Anyone can browse a file or directory in the kindeditor/attached/ folder via the path parameter without authentication.
Max CVSS
7.5
EPSS Score
0.14%
Published
2018-11-05
Updated
2018-12-10
An issue was discovered in PopojiCMS v2.0.1. admin_library.php allows remote attackers to delete arbitrary files via directory traversal in the po-admin/route.php?mod=library&act=delete id parameter.
Max CVSS
7.5
EPSS Score
0.18%
Published
2018-11-05
Updated
2018-12-11
MiniCMS 1.10 allows full path disclosure via /mc-admin/post.php?state=delete&delete= with an invalid filename.
Max CVSS
5.3
EPSS Score
0.07%
Published
2018-11-01
Updated
2018-12-03
Directory traversal vulnerability in Microstrategy Web, version 7, in "/WebMstr7/servlet/mstrWeb" (in the parameter subpage) allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a /.. (slash dot dot) in a pathname used by a web application. NOTE: this is a deprecated product.
Max CVSS
4.3
EPSS Score
0.19%
Published
2018-11-01
Updated
2018-12-12

CVE-2018-17934

Public exploit
NUUO CMS All versions 3.3 and prior the application allows external input to construct a pathname that is able to be resolved outside the intended directory. This could allow an attacker to impersonate a legitimate user, obtain restricted information, or execute arbitrary code.
Max CVSS
9.8
EPSS Score
17.92%
Published
2018-11-27
Updated
2019-10-09
A Path Traversal in Knightjs versions <= 0.0.1 allows an attacker to read content of arbitrary files on a remote server.
Max CVSS
7.5
EPSS Score
0.90%
Published
2018-11-06
Updated
2019-10-09
A path traversal in takeapeek module versions <=0.2.2 allows an attacker to list directory and files.
Max CVSS
5.3
EPSS Score
0.13%
Published
2018-11-06
Updated
2019-10-09
A vulnerability in the web-based UI of Cisco Prime Collaboration Assurance could allow an authenticated, remote attacker to overwrite files on the file system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using a specific UI input field to provide a custom path location. A successful exploit could allow the attacker to overwrite files on the file system.
Max CVSS
6.5
EPSS Score
0.15%
Published
2018-11-08
Updated
2020-09-16
Directory Traversal in the explorer application in TerraMaster TOS version 3.1.03 allows attackers to upload files to arbitrary locations via the "path" URL parameter.
Max CVSS
7.5
EPSS Score
0.15%
Published
2018-11-27
Updated
2018-12-20
Directory traversal in list_folders method in Buffalo TS5600D1206 version 3.61-0.10 allows attackers to list directory contents via the "path" parameter.
Max CVSS
6.5
EPSS Score
0.12%
Published
2018-11-26
Updated
2018-12-26
In Attachment of Attachment.java and getFilePath of EmlAttachmentProvider.java, there is a possible Elevation of Privilege due to a path traversal error. This could lead to a remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-66230183.
Max CVSS
8.8
EPSS Score
0.24%
Published
2018-11-06
Updated
2019-01-30
In readMetadata of Utils.cpp, there is a possible path traversal bug due to a confused deputy. This could lead to local escalation of privilege when mounting a USB device with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android-6.0 Android-6.0.1 Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android ID: A-80436257.
Max CVSS
7.2
EPSS Score
0.08%
Published
2018-11-06
Updated
2018-12-12
Apache Hadoop 3.1.0, 3.0.0-alpha to 3.0.2, 2.9.0 to 2.9.1, 2.8.0 to 2.8.4, 2.0.0-alpha to 2.7.6, 0.23.0 to 0.23.11 is exploitable via the zip slip vulnerability in places that accept a zip file.
Max CVSS
8.8
EPSS Score
8.62%
Published
2018-11-13
Updated
2020-10-08
Data Center Expert, versions 7.5.0 and earlier, allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code.
Max CVSS
8.8
EPSS Score
0.13%
Published
2018-11-30
Updated
2018-12-28
Data Center Operation allows for the upload of a zip file from its user interface to the server. A carefully crafted, malicious file could be mistakenly uploaded by an authenticated user via this feature which could contain path traversal file names. As such, it could allow for the arbitrary upload of files contained with the zip onto the server file system outside of the intended directory. This is leveraging the more commonly known ZipSlip vulnerability within Java code.
Max CVSS
8.8
EPSS Score
0.13%
Published
2018-11-30
Updated
2018-12-28
29 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!